Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (22)

A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?

subnotebook

What type of management system below can help distribute and manage public and corporate apps?

Wireless Device Management

Mobile Device Management

Total Device Management

Extended Device Management

Mobile Device Management

How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"

Mobile Application Management

Extended Application Management

Remote Application Management

Cloud Application Management

Mobile Application Management

Which of the following selections is not one of the features provided by a typical MDM?

Rapidly deploy new mobile devices

Discover devices accessing enterprise systems

Track stolen devices

Enforce encryption settings

Track stolen devices

A QR code can't contain which of the following items directly?

A URL.

A phone number.

An e-mail address.

A video.

a video

what is designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?

tablet

computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.

web-based

How is the coverage area for a cellular telephony network usually divided in a typical city?

Hexagon shaped cells.

Square square shaped cells.

Triangle shaped cells.

Circular shaped cells.

hexagon shaped cells

located in a satellite and regenerates a signal that is sent back to earth at another frequency

repeater

Select the proprietary wireless network technology that is used primarily by sensors for communicating data.

ANT

Bluetooth

SCD

USB

ANT

Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices?

BYOD

COPE

VDI

CYOD

COPE (Corporate owned, personally enabled)

Which enterprise deployment model allows users to use their personal mobile devices for business purposes?

BYOD

COPE

VDI

CYOD

BYOD

Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?

management flexibility

increased internal service

increased employee performance

less oversight

increased internal service

what adds geographical identification data to media such as digital photos taken on a mobile device?

GPS tagging

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
OTG

COPE

OTA

VDI

OTG

Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?

selected context authentication

context-aware authentication

user designated authentication

trigger locking

context-aware authentication

Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel?

P2413 Standard

European Union Telecomm Law and Regulations

Security 2 (S2) framework

Industrial Internet Security Framework (IISF)

Security 2 (S2) framework

What type of software is specifically designed for a SoC in an embedded system?

SCADA
HVAC
ICS
RTOS

RTOS

What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?

SCADA

HVAC

ICS

RTOS

ICS

Which of the following can replace using radio frequency (RF) for the communication media?

ANT

Bluetooth

repeaters

infrared

infrared

Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?

extended management

content management

remote management

application management

content managment

What type of update service can Apple users take advantage of to update their operating systems via wireless carriers?

OTG

COPE

OTA

VDI

OTA

Sets with similar terms

ITS - Final - 3/4

25 terms

oremacc

Intro to Network Security sixth ed chapter 10

60 terms

david_ellis43

9, 10, 11, 12 CIT 270 System Security Review

136 terms

abby_king89

CIS ch 10

63 terms

Kevin_Kolb3

Sets found in the same folder

Chapter 9 Quiz

40 terms

Casey_Scott305

Chapter 10 Quiz

24 terms

asuone39

Network Security Ch 6 Part 2

40 terms

sony_ann

CH13

40 terms

siggyfresh

Other sets by this creator

Quantitative Reasoning

2 terms

lizgyuris

Exam 2

19 terms

lizgyuris

Exam 2

3 terms

lizgyuris

Marketing Research exam 1

141 terms

lizgyuris

Other Quizlet sets

Test #2: Chapter 6

21 terms

elizabeth_holcomb1

Rad-Bio CH 1-2

20 terms

karliewyman

Evercore Oil

68 terms

SethObadia

Pain IV NSAIDS & Acetaminophen

14 terms

mollyk0005

Related questions

QUESTION

Your location can be captured from your mobile device even if app location tracking is turned off. (T or F)

6 answers

QUESTION

Microsoft also supports remote management via PowerShell. This technique is often called Windows Remote Management. It requires a Service ("WinRM") to be running on the client. (1)

2 answers

QUESTION

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information?

15 answers

QUESTION

Which type of website file contains software that's executed by the browser on the user's computer?

15 answers

Which enterprise deployment model allows users to use their personal mobile devices for business?

BYOD (bring your own device) is undoubtedly the most well-known policy on this list, and the most popular deployment model for businesses. Under a BYOD policy, employees bring their personal devices to the office and use them for work-related tasks.

In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use?

-In corporate-owned personally enabled (COPE) models, employees are supplied a chosen device paid for by their company for both professional and personal use.

Which access control model that uses access based on a user's job function within an organization?

Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise. RBAC ensures employees access only information they need to do their jobs and prevents them from accessing information that doesn't pertain to them.

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions.